CFP last date
22 April 2024
Reseach Article

Comparative Study of Transport Protocols in WSN

by Ridha Azizi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 6
Year of Publication: 2015
Authors: Ridha Azizi
10.5120/19827-1674

Ridha Azizi . Comparative Study of Transport Protocols in WSN. International Journal of Computer Applications. 113, 6 ( March 2015), 1-9. DOI=10.5120/19827-1674

@article{ 10.5120/19827-1674,
author = { Ridha Azizi },
title = { Comparative Study of Transport Protocols in WSN },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 6 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number6/19827-1674/ },
doi = { 10.5120/19827-1674 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:13.287724+05:30
%A Ridha Azizi
%T Comparative Study of Transport Protocols in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 6
%P 1-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The wireless sensor networks are a major technological development into the various problems in many application areas related to health, safety, environment, etc. This work focuses on sensor networks and mainly on the transport layer which must detect and avoid congestion. It is desirable that the transport layers protocols provide reliability suggestions planned solve problems of congestion and optimize energy. Several proposals have been made for alternative transport protocols, generally oriented to optimize specific aspects and / or application scenarios. We did a study on wireless sensor networks and its various transport mechanisms. We also conducted a comparative study between several transport protocols. Thereafter, we emulated two transport protocols based on two main criteria which are reliability and congestion. We are therefore interested in the results to find the most reliable protocol that provides a transfer with the least loss.

References
  1. Khenfouci Y and Badawi A "approach authentication in sensor networks for education," 2008/2009
  2. Feury David symplot-ryl "Sensor Networks", ISIC INSA Lyon-ARES/INRIA, 16 December 2004.
  3. Badache N. and Lemlouma T. "The routing in mobile ad hoc networks. " Research Report INRIA. 1999.
  4. Akyildiz E, Cayirci, Y. "A Survey on Sensor networks», IEEE Communications Magazine, vol. 40, no. 8, pp . 102-114, Georgia Institute of Technology,Atlanta, USA. Aug. 2002.
  5. Khalifa B. «Security in wireless sensor networks ", lecture at the University of Bechar. Spring of 2006.
  6. Yasser R" performance evaluation of S -MAC protocols and Directed Diffusion in sensor networks , project report at the end of study, Graduate School of Communications of Tunis, 2007.
  7. Sophia K "security models for wireless sensor networks", research report, March 2006.
  8. Bouabdellah K "problem of energy consumption in wireless sensor networks son»LIUPA, University of Oran, October 2007.
  9. Mohammad I, Imad M, "Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems. » Chapter 15, CRC Press LLC, 2005.
  10. Sofiane M ,«Energy consumption in wireless sensor networks", research study Master IFSIC - Rennes1, 2007/2008.
  11. jumzheng and abbasjamalipour "Wireless sensor networks: A Networking Perspective".
  12. Séverine S, "Software Architecture for wireless sensor networking son» master internet technologies, University Skin and Pays de l'Adour , in June 2006 .
  13. Lyes K, Najeeb B, "Sensor networks: state of the art " research report, USTHB, Algiers, February 2004.
  14. Xavier P, "Introduction to sensor networks ", 2005.
  15. Claude C and Aurélien F , "protect sensor networks without son " , INRIA, 2008.
  16. Mehrotra, S. «Distributed Algorithms for Tasking Large Sensor Networks. » Final thesis. 2001.
  17. Callaway, Edgar H. "Wireless sensor networks: Architectures and protocols". CRC Press (2004).
  18. Savvides, A. , C. -C. Han and M. Srivastava. «Dynamic fine -grainedlocalization in Ad- Hoc networks of sensors. » Mobile Computing and Networking (MobiCom). ACM, 2001.
  19. Callaway, Edgar H. "Wireless sensor networks: Architectures and protocols. »CRC Press(2004).
  20. Mills, D. L. "Internet time synchronization: the network time protocol. Global States and Time in Distributed Systems, " IEEE Computer Society Press 1994 : 1482-1493.
  21. Karlof, C. , N. Sastry and Wagner B. . «Tinysecalnk layer security architecture for wireless sensor networks. »Reaserch article. 2004.
  22. Aboclaze, M. and Aloul F. «Current and future trends in sensor networks: a. Survey" Wireless and Optical Communications Networks. IFIP International Conference, 2005. 551-555.
  23. Chan, H. , M. and LukPerrig A. "Using Clustering Information for sensor network localization. » Distributed Computing in Sensor Systems. Carnegie Mellon University, 2005.
  24. Ghiasi, S. , et al. «Optimal energy aware clustering in sensor. » Sensors (2002):258-269 . 109-125.
  25. Data Transport Reliability in wireless Sensor Networks -A Survey of Issues and Solutions (AndreasWillig,HolgerKarl)
  26. RMST : Reliable Data Transport in Sensor
  27. Networks 1 (Fred Stann , John Heidemann ) T. Zhao , W. Cai, Y. and Li MPIDA : " A sensor network topology inference algorithm . ". In Proc. Int. Conf. On Computational Intelligence and Security, pages 451-455, 2007.
  28. Y. Yang, Y. Xu, X. and Li Topology "tomography in wireless sensor networks based on data aggregation. InProc. ». Int. Conf. On Communications and Mobile Computing, pages 37-41, 2009.
  29. Stefanos A. "Energy Efficient Routing in Wireless Sensor Networks through Balanced Clustering" OPEN ACCESS Algorithm 2013.
Index Terms

Computer Science
Information Sciences

Keywords

WSN transportation reliability and congestion